It's actually even better than that. The official recommendation is a/48 per end-site. As far as I have been able to tell, I think ISP's are generally following that. I had heard something about using/56 per end site for residential users. That still gives people plenty of room to have multiple subnets though.

I definitely agree with the concerns about IPv6 in the enterprise. Sure, almost everything has had some IPv6 support for years, but the feature parity with IPv4 was not there. (For example maybe something supports OSPF / BGP with IPv4 but only static routes with IPv6...or you can reference address groups from within a IPv4 ACL but not from IPv6). Even today some vendors (*cough* Juniper on their EX switches *cough*) see IPv6 routing as "extra" feature that isn't available on the basic license level. This is unacceptable, and shows a complete disconnect between vendors and enterprises / service providers with respect to what's actually needed for real world IPv6 deployments.

It would be interesting as well to know how much of an impact this would have to people on the Martian surface. Mars's magnetic field is pretty weak compared to ours. I guess they would be a little better protected just by the planet surface itself.

Even on the Apollo missions to the moon, they recognized that a solar storm could be a significant threat to the astronauts. Given the infrequence they decided to just take their chances. But the time they spent outside of the LEO was pretty low compared to what a Mars mission would entail.

My point is that RH isn't going to make that kind of change in an existing version of RHEL.

Now upgrading from 5 -> 6, or 6 -> 7 whenever that's released. Yeah...stuff's going to change. Maybe they'll put this in RHEL 7. But I don't this significant of a change would be pushed down as a normal update within v5 / v6 even in a 6.x or 5.x update.

I for one would much rather control which network can access a service in one place (a centralized firewall), rather than manage it through ten different config files that use different syntaxes on a bunch of servers for every service.

Yep...I do this with Unison so writes on both sides can be replicated. Granted - I'm not replicating significant amounts of data, I've heard Unison may have problems with large volumes of data. But I think the Internet connection would be more of an issue than that.

omega6 writes: Supreme Court of Canada ruled that posting links is not the same as posting the actual content, but more similar to a footnote."The top court ruled against former Green party campaign manager Wayne Crookes, who argued that posting links to sites with defamatory statements was the same as publishing the defamatory material."

itwbennett writes: "Researchers from Kaspersky Lab have discovered that the R2D2 surveillance Trojan, which is used by German law enforcement to intercept Internet phone calls is capable of monitoring traffic from popular browsers and instant messaging applications. 'Amongst the new things we found in there are two rather interesting ones: Firstly, this version is not only capable of running on 32 bit systems; it also includes support for 64 bit versions of Windows,' said Tillmann Werner, a security researcher with Kaspersky in Germany. 'Secondly, the list of target processes to monitor is longer than the one mentioned in the CCC [Chaos Computer Club] report. The number of applications infected by the various components is 15 in total.'"

itwbennett writes: "Oracle has released a new Java security update to address multiple vulnerabilities, including one exploited during a recently disclosed attack that can allow eavesdropping on encrypted communications. Identified as CVE-2011-3389, that vulnerability nearly led to Firefox developers banning Java from the browser. Mozilla officially announced on Tuesday that blocking Java is off the table for now, especially since Oracle released a fix for the vulnerability. 'We will not be blocking vulnerable versions of Java at this time, though we will continue to monitor for incidents of this vulnerability being exploited in the wild,' the browser maker said."